An ID-based proxy signature scheme secure against proxy key exposure

被引:0
|
作者
Wen F. [1 ]
Cui S. [1 ]
Cui J. [2 ]
机构
[1] School of mathematics, University of Jinan, Jinan
[2] Shandong Women's University, Jinan
关键词
ID-based proxy signature; Provable security; Proxy key exposure;
D O I
10.4156/ijact.vol3.issue5.12
中图分类号
学科分类号
摘要
Proxy Signature is very important technologies in secure e-commerce. In this paper, we study the security of three ID-based Proxy Signature Scheme Against Proxy Key Exposure. We point out that those schemes are vulnerable to proxy key exposure attack. Then we propose a new scheme to overcome this defect and analyze its security and efficiency. We claim that our new scheme is more efficiency and can be proved secure against proxy key exposure in the random oracle model. In particular, our scheme doesn't need secure information channel.
引用
收藏
页码:108 / 116
页数:8
相关论文
共 50 条
  • [1] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [2] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):
  • [3] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [4] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [5] General secure ID-based proxy signature scheme with multi-delegation
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Wen, Mi
    Wang, Yong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 710 - 714
  • [6] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [7] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 105 - 108
  • [8] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    WuhanUniversityJournalofNaturalSciences, 2005, (03) : 555 - 558
  • [9] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [10] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724